Skip to main content

IPv6 Host Configuration of DNS Server Information Approaches
draft-ietf-dnsop-ipv6-dns-configuration-06

Revision differences

Document history

Date Rev. By Action
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Ted Hardie
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Margaret Wasserman
2005-08-30
06 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-08-23
06 Amy Vezza IESG state changed to Approved-announcement sent
2005-08-23
06 Amy Vezza IESG has approved the document
2005-08-23
06 Amy Vezza Closed "Approve" ballot
2005-08-23
06 David Kessens State Changes to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed by David Kessens
2005-08-23
06 David Kessens Note field has been cleared by David Kessens
2005-07-08
06 (System) Removed from agenda for telechat - 2005-07-07
2005-07-07
06 Amy Vezza State Changes to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation::AD Followup by Amy Vezza
2005-07-07
06 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Discuss by Ted Hardie
2005-06-30
06 David Kessens Placed on agenda for telechat - 2005-07-07 by David Kessens
2005-06-30
06 David Kessens [Note]: 'Back to the IESG to discuss IESG note.' added by David Kessens
2005-05-05
06 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-05-05
06 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-06.txt
2005-04-04
06 Margaret Cullen [Ballot Position Update] Position for Margaret Wasserman has been changed to No Objection from Discuss by Margaret Wasserman
2005-03-31
06 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2005-03-31
06 Margaret Cullen
[Ballot discuss]
This document has normative references to mechanisms (such as the RA DNS configuration mechanism) that the IETF has no active effort to standardize …
[Ballot discuss]
This document has normative references to mechanisms (such as the RA DNS configuration mechanism) that the IETF has no active effort to standardize (or even publish) as far as I know.
2005-03-31
06 Bert Wijnen [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Undefined by Bert Wijnen
2005-03-31
06 Margaret Cullen
[Ballot discuss]
This document has normative references to mechanims (such as the RA DNS configuration mechanism) that the IETF has no active effort to standardize …
[Ballot discuss]
This document has normative references to mechanims (such as the RA DNS configuration mechanism) that the IETF has no active effort to standardize (or even publish) as far as I know.
2005-03-31
06 Margaret Cullen [Ballot Position Update] Position for Margaret Wasserman has been changed to Discuss from No Objection by Margaret Wasserman
2005-03-31
06 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2005-03-31
06 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-03-30
06 David Kessens
[Ballot comment]
Comments from David Kessens:

The WLAN discussion is problematic. First problem is that there is no
definition of what WLAN actually is (802.11a/b/g …
[Ballot comment]
Comments from David Kessens:

The WLAN discussion is problematic. First problem is that there is no
definition of what WLAN actually is (802.11a/b/g perhaps ?) and
secondly because the problems that 802.11a/b/g supposedly has in the 
RA context can be considered as a general RA issue that is not related
at all to adding the DNS option. 
Specifically, if one already uses route advertisements over a WLAN
anyways, I cannot see why adding a DNS option would really make things
worse. More appropriate wording would be something like: 'The RA
option solution might not work very well on a congested medium that
uses reliable multicast for RA'.
actices, but provides no analysis of the security implications of multihoming.

Comments received from Iljitsch van Beijnum  (13 Oct 2004 10:45:15 +0200):

This message is mostly the same as one I posted to the wg list
yesterday. See that one for an additional list of smaller nits.
                                                                                       
First a side issue.
                                                                                       
Under the ND approach there are remarks about multicast difficulties in
wireless environments. There is some additional talk about multicast in
wireless environments in an appendix, but this discussion doesn't
capture the real-world complexities that exist here (and that DHCP also
uses multicast but the issue is very different there). The pertinent
information has been discussed on the list so including it shouldn't be
too hard, or maybe a spin-off informational RFC would be appropriate.
Also note that there isn't much of a real-world issue: ARP in IPv4 also
works, while it suffers from the same broadcast/multicast problems as
IPv6 neighbor discovery.

More to the point, two very important issues are missing.
                                                                                       
The first is that we are living in 2004. If this were 2001, we could
simply identify the best approach and standardize it. However, IPv6 is
already widely implemented in hosts and deployment is growing. The lack
of a recursive resolver configuration mechanism is felt every day. If
we select an approach that needs considerable implementation effort, it
can be as much as two years before this approach is actually available
to users. The worst choice in this regard would be the RA approach.
While in itself this is a very good approach, it suffers from the fact
that both routers and hosts must support it before it can be used.
Implementation cycles vary widely throughout the industry, but it's
safe to say that anyone who doesn't use both routers AND hosts with the
shortest implementation cycle will have to wait at least until 2006
before an RA approach could conceivably be available.
                                                                                       
The DHCP approach has the advantage that it can be implemented on
special purpose servers rather than having to be implemented in
routers. Some systems use a very simple mechanism to configure
recursive resolver addresses, and on those systems it's very easy to
add a userland DHCP client daemon that handles this task. However, on
widely used systems such as Windows and MacOS X reconfiguring recursive
resolvers isn't something that can be easily done by a userland
program. Realistically, users will have to wait until Microsoft or
Apple bundle support for DHCPv6 in their products. Again, this is
likely to take a significant amount of time.

The well-known address approach on the other hand, can be deployed
pretty much immediately. The only thing that's needed is for IANA to
register a set of addresses and within weeks these addresses would be
usable by any IPv6 implementation that supports DNS queries over IPv6
transport.
                                                                                       
The second issue is security.
                                                                                       
One thing that bothers me about a DHCP-only approach is that it
requires networks that have otherwise no interest in DHCPv6 to run
DHCPv6 servers and clients. Past experience shows that complex
UDP-based protocols are often implemented insecurely. So an approach
that doesn't require additional protocols would be preferable from a
security standpoint. (And from management and debugging standpoints as
well.)
                                                                                       
Both DHCPv6 and RA have an inherent security problem because the host
is supposed to trust information that comes in from unknown sources.
This makes it very easy for an on-link attacker to present itself as a
legitimate DHCP server or router and provide clandestine configuration
information. I believe efforts are underway to remedy this situation,
but again, it will be some time before most clients will be able to use
these new mechanisms in practice. In the mean time having recursive
resolver information be available over insecure DHCP or RA means that
attackers gain an additional attack vector. (And heavy crypto doesn't
exactly go hand in hand with autoconfiguration, it remains to be seen
how well this is going to work in practice for nomadic users.)

Last but not least, not about the draft but about the decision that
needs to be made: it worries me that this issue hasn't been resolved
earlier. I believe one of the main reasons for this is that the DHCP
proponents are blocking consensus on the other approaches in order to
arrive at the situation where everyone implements DHCP and the issue
becomes moot. Note that there are several IPR claims on parts of DHCP
that may or may not apply here, adding insult to injury for those who
don't want to run DHCP in the first place.
                                                                                       
The only way to overcome this abuse of the IETF process is for the IESG
to recognize the lack of consensus and decide on the issue itself.
                                                                                       
Iljitsch van Beijnum

---

Comments from the ops directorate (Mar 30 17:21:11 PST 2005):

1. The document would benefit from a grammar edit.  Rather than requiring
the RFC Editor to do this work, I would prefer to see documents correct
grammatical mistakes prior to submission to the IESG.

2. The security considerations section (6) does not describe the
security implications of each approach.  This is important
because the approaches have different security implications.
For example, the RDNSS approach would utilize SEND for security,
which implies that the client has a trust anchor configured,
and the server signs RA messages.  On the other hand, the DHCPv6
approach would utilize DHCPv6 security, which has a different
trust model.  The anycast approach does not require
configuration security, since there is no protocol.

3. This document does not address the implications of DNS
configuration approaches on the use of link-local DNS
resolution, such as mDNS and LLMNR.  For example, where a
DNS server is not available, in the RDNSS or DHCPv6 case
no DNS server is configured, and link local name resolution
will be used exclusively without DNS queries being sent.
However, in the anycast case, DNS queries will be sent,
and if not answered, DNS clients may agressively retransmit.
Linklocal name resolution will only take place once they
time out.  The difference is particularly important for
dual stack hosts residing on IPv4 native networks, where the anycast
approach could result in persistent (and unnecessary) DNS traffic.
2005-03-27
06 Brian Carpenter [Ballot comment]
Removing Harald's discuss - fixed
2005-03-27
06 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2005-03-24
06 David Kessens State Changes to IESG Evaluation from IESG Evaluation::AD Followup by David Kessens
2005-03-24
06 David Kessens Placed on agenda for telechat - 2005-03-31 by David Kessens
2005-03-24
06 David Kessens [Note]: 'Back to the IESG to check new version' added by David Kessens
2005-02-21
05 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-05.txt
2005-01-13
06 David Kessens
[Ballot comment]
The WLAN discussion is problematic. First problem is that there is no
definition of what WLAN actually is (802.11a/b/g perhaps ?) and
secondly …
[Ballot comment]
The WLAN discussion is problematic. First problem is that there is no
definition of what WLAN actually is (802.11a/b/g perhaps ?) and
secondly because the problems that 802.11a/b/g supposedly has in the 
RA context can be considered as a general RA issue that is not related
at all to adding the DNS option. 
Specifically, if one already uses route advertisements over a WLAN
anyways, I cannot see why adding a DNS option would really make things
worse. More appropriate wording would be something like: 'The RA
option solution might not work very well on a congested medium that
uses reliable multicast for RA'.
actices, but provides no analysis of the security implications of multihoming.

Comments received from Iljitsch van Beijnum  (13 Oct 2004 10:45:15 +0200):

This message is mostly the same as one I posted to the wg list
yesterday. See that one for an additional list of smaller nits.
                                                                                       
First a side issue.
                                                                                       
Under the ND approach there are remarks about multicast difficulties in
wireless environments. There is some additional talk about multicast in
wireless environments in an appendix, but this discussion doesn't
capture the real-world complexities that exist here (and that DHCP also
uses multicast but the issue is very different there). The pertinent
information has been discussed on the list so including it shouldn't be
too hard, or maybe a spin-off informational RFC would be appropriate.
Also note that there isn't much of a real-world issue: ARP in IPv4 also
works, while it suffers from the same broadcast/multicast problems as
IPv6 neighbor discovery.

More to the point, two very important issues are missing.
                                                                                       
The first is that we are living in 2004. If this were 2001, we could
simply identify the best approach and standardize it. However, IPv6 is
already widely implemented in hosts and deployment is growing. The lack
of a recursive resolver configuration mechanism is felt every day. If
we select an approach that needs considerable implementation effort, it
can be as much as two years before this approach is actually available
to users. The worst choice in this regard would be the RA approach.
While in itself this is a very good approach, it suffers from the fact
that both routers and hosts must support it before it can be used.
Implementation cycles vary widely throughout the industry, but it's
safe to say that anyone who doesn't use both routers AND hosts with the
shortest implementation cycle will have to wait at least until 2006
before an RA approach could conceivably be available.
                                                                                       
The DHCP approach has the advantage that it can be implemented on
special purpose servers rather than having to be implemented in
routers. Some systems use a very simple mechanism to configure
recursive resolver addresses, and on those systems it's very easy to
add a userland DHCP client daemon that handles this task. However, on
widely used systems such as Windows and MacOS X reconfiguring recursive
resolvers isn't something that can be easily done by a userland
program. Realistically, users will have to wait until Microsoft or
Apple bundle support for DHCPv6 in their products. Again, this is
likely to take a significant amount of time.

The well-known address approach on the other hand, can be deployed
pretty much immediately. The only thing that's needed is for IANA to
register a set of addresses and within weeks these addresses would be
usable by any IPv6 implementation that supports DNS queries over IPv6
transport.
                                                                                       
The second issue is security.
                                                                                       
One thing that bothers me about a DHCP-only approach is that it
requires networks that have otherwise no interest in DHCPv6 to run
DHCPv6 servers and clients. Past experience shows that complex
UDP-based protocols are often implemented insecurely. So an approach
that doesn't require additional protocols would be preferable from a
security standpoint. (And from management and debugging standpoints as
well.)
                                                                                       
Both DHCPv6 and RA have an inherent security problem because the host
is supposed to trust information that comes in from unknown sources.
This makes it very easy for an on-link attacker to present itself as a
legitimate DHCP server or router and provide clandestine configuration
information. I believe efforts are underway to remedy this situation,
but again, it will be some time before most clients will be able to use
these new mechanisms in practice. In the mean time having recursive
resolver information be available over insecure DHCP or RA means that
attackers gain an additional attack vector. (And heavy crypto doesn't
exactly go hand in hand with autoconfiguration, it remains to be seen
how well this is going to work in practice for nomadic users.)

Last but not least, not about the draft but about the decision that
needs to be made: it worries me that this issue hasn't been resolved
earlier. I believe one of the main reasons for this is that the DHCP
proponents are blocking consensus on the other approaches in order to
arrive at the situation where everyone implements DHCP and the issue
becomes moot. Note that there are several IPR claims on parts of DHCP
that may or may not apply here, adding insult to injury for those who
don't want to run DHCP in the first place.
                                                                                       
The only way to overcome this abuse of the IETF process is for the IESG
to recognize the lack of consensus and decide on the issue itself.
                                                                                       
Iljitsch van Beijnum
2004-11-18
06 Allison Mankin
[Ballot comment]
This is a ridiculous form of rhetorical argument:

  Therefore, if ND supports the configuration of some additional
  services, such as DNS, …
[Ballot comment]
This is a ridiculous form of rhetorical argument:

  Therefore, if ND supports the configuration of some additional
  services, such as DNS, NTP and SIP servers, ND should be extended
  in kernel part, and complemented by a user-land process.

There would be immediate architectural and SIP pushback against adding SIP to ND,
so using this as a whipping boy is ridiculous, and probably shows a negative technique
under way here.
2004-11-18
06 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation - Defer by Amy Vezza
2004-11-18
06 Allison Mankin
[Ballot comment]
Where is RA going - to add a broad array of services to ND: they mention
SIP servers as well as NTP.  This …
[Ballot comment]
Where is RA going - to add a broad array of services to ND: they mention
SIP servers as well as NTP.  This slippery slope is nasty.
2004-11-18
06 Allison Mankin
[Ballot comment]
This is a ridiculous form of rhetorical argument:

  Therefore, if ND supports the configuration of some additional
  services, such as DNS, …
[Ballot comment]
This is a ridiculous form of rhetorical argument:

  Therefore, if ND supports the configuration of some additional
  services, such as DNS, NTP and SIP servers, ND should be extended
  in kernel part, and complemented by a user-land process.

There would be immediate architectural and SIP pushback against adding SIP to ND,
so using this as a whipping boy is ridiculous, and probably shows a negative technique
under way here.
2004-11-18
06 Allison Mankin [Ballot Position Update] New position, Undefined, has been recorded for Allison Mankin by Allison Mankin
2004-11-18
06 Bert Wijnen
[Ballot comment]
$ findref draft-ietf-dnsop-ipv6-dns-configuration-04.txt

!! Missing citation for Normative reference:
  P020 L013:    [1]  S. Bradner, "Intellectual Property Rights in IETF Technology",

!! …
[Ballot comment]
$ findref draft-ietf-dnsop-ipv6-dns-configuration-04.txt

!! Missing citation for Normative reference:
  P020 L013:    [1]  S. Bradner, "Intellectual Property Rights in IETF Technology",

!! Missing citation for Normative reference:
  P020 L016:    [2]  S. Bradner, "IETF Rights in Contributions", RFC 3667, February

$ idnits-v1.47 draft-ietf-dnsop-ipv6-dns-configuration-04.txt
idnits 1.47 (02 Nov 2004)

draft-ietf-dnsop-ipv6-dns-configuration-04.txt:

  The document seems to lack an IANA Considerations section
  Checking conformance with RFC 3667/3668 boilerplate...
  The document seems to lack an RFC 3667 Section 5.1 IPR Disclosure Acknowledgement
  -- however, there's a paragraph with a matching beginning. Boilerplate error?

  Warnings:
    There are 18 instances of lines with hyphenated line breaks in the document.
2004-11-18
06 Bert Wijnen [Ballot Position Update] New position, Undefined, has been recorded for Bert Wijnen by Bert Wijnen
2004-11-17
06 Harald Alvestrand
[Ballot comment]
A number of sentences are missing a "the" according to my sense of English, but are nonetheless clear.

I found the explanation of …
[Ballot comment]
A number of sentences are missing a "the" according to my sense of English, but are nonetheless clear.

I found the explanation of the anycast option difficult to follow.

Reviewed by Joel Halpern, Gen-ART.
His review:

This draft is basically ready for publication as an Informational RFC, but has nits that should be fixed before publication.  There is one item that I think needs clarification before publication.

Specifically, I found one aspect of this document confusing.  In discussing the use of well known anycast addresses for the recursive DNS server, several things are stated.  One is that the Host can be pre-configured, possibly by the factory, with the suitable address.  The other is that multiple servers may have distinct anycast addresses.
  "Redundancy by multiple RDNSSes is better provided
by multiple servers having different anycast addresses than multiple
servers sharing same anycast address...

I do not follow how the hsot can be pre-configured with the anycast address when there different anycast addresses in use.  Can this really be describes as "a well known anycast address"?
2004-11-17
06 Harald Alvestrand
[Ballot discuss]
I think this document should have pointers to various other docs describing work we have done with anycast addresses. An IESG note may …
[Ballot discuss]
I think this document should have pointers to various other docs describing work we have done with anycast addresses. An IESG note may be appropriate; I've suggested one on the IESG list.
2004-11-17
06 Harald Alvestrand [Ballot Position Update] New position, Discuss, has been recorded for Harald Alvestrand by Harald Alvestrand
2004-11-16
06 Ted Hardie
[Ballot discuss]
I think the section on the anycast approach needs extensive work.  As it stands now,
the document says that they don't mean RFC …
[Ballot discuss]
I think the section on the anycast approach needs extensive work.  As it stands now,
the document says that they don't mean RFC 1546 or RFC 3513 versions of anycast,
but doesn't quite ever come out and say what it does mean.  It comes close with:

  The approach with well-known anycast addresses is to set well-known
  anycast addresses in clients' resolver configuration files from the
  beginning, say, as factory default.  Thus, there is no transport
  mechanism and no packet format [9].
 
  An anycast address is an address shared by multiple servers (in
  this case, the servers are RDNSSes).  Request from a client to the
  anycast address is routed to a server selected by the routing
  system. However, it is a bad idea to mandate "site" boundary on
  anycast addresses, because most users just do not have their own
  servers and want to access their ISPs' across their site boundaries.
  Larger sites may also depend on their ISPs or may have their own
  RDNSSes within "site" boundaries.

This looks an awful like what was described in RFC 3258 without
any of the caveats related to routing system changes or finding
the administrative entity responsible.  More importantly, though,
it presumes that a well-known address burned into non-volatile
memory is not going to turn into the NTP problem we just
said was harmful; what makes the author so sure?  If this isn't something
required to be provided by the "site", then it becomes something where
one site's users could DoS another's--accidentally or on purpose.  To fix that,
you would actually have to filter traffic to this address from
non-customer peers, which is not mentioned as one of the costs.
It also doesn't acknowledge how easy this makes hijacking
or what it would take to make  DNSSEC help (it is the authoritative
servers that would have to move to DNSSEC to make hijacking
of the recursive servers less of a problem)
2004-11-16
06 Ted Hardie [Ballot Position Update] New position, Discuss, has been recorded for Ted Hardie by Ted Hardie
2004-11-12
06 Sam Hartman
[Ballot comment]
I'd like to echo Steve's comments about dnssec.  This document should
discuss it in the security considerations section.  Also, the text in
that …
[Ballot comment]
I'd like to echo Steve's comments about dnssec.  This document should
discuss it in the security considerations section.  Also, the text in
that section about autoconfiguration is misleading in the far
long-term.  Configuration of root keys might be acceptable in many
environments where configuration of other state would be unacceptable.
I realize this is not an option today.

I disagree with Iljitsch van Beijnum that the anycast approach is more
secure.  It seems that it would suffer from the same sort of on-link
attacks as the RA and DHCP approaches.
2004-11-12
06 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded for Sam Hartman by Sam Hartman
2004-10-26
06 Ted Hardie State Changes to IESG Evaluation - Defer from IESG Evaluation by Ted Hardie
2004-10-26
06 Steven Bellovin
[Ballot comment]
The Security Considerations section should be updated to mention DNSsec; if it is used -- and the signatures verified on the client host …
[Ballot comment]
The Security Considerations section should be updated to mention DNSsec; if it is used -- and the signatures verified on the client host -- misconfiguration of a DNS server is simply denial of service.
2004-10-26
06 Steven Bellovin [Ballot Position Update] New position, No Objection, has been recorded for Steve Bellovin by Steve Bellovin
2004-10-25
06 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley
2004-10-22
06 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2004-10-15
06 Michelle Cotton IANA Review Comments - We understand this document to have NO IANA Actions
2004-10-13
06 David Kessens
[Ballot comment]
Comments received from Iljitsch van Beijnum  (13 Oct 2004 10:45:15 +0200):

This message is mostly the same as one I posted to the …
[Ballot comment]
Comments received from Iljitsch van Beijnum  (13 Oct 2004 10:45:15 +0200):

This message is mostly the same as one I posted to the wg list
yesterday. See that one for an additional list of smaller nits.
                                                                                       
First a side issue.
                                                                                       
Under the ND approach there are remarks about multicast difficulties in
wireless environments. There is some additional talk about multicast in
wireless environments in an appendix, but this discussion doesn't
capture the real-world complexities that exist here (and that DHCP also
uses multicast but the issue is very different there). The pertinent
information has been discussed on the list so including it shouldn't be
too hard, or maybe a spin-off informational RFC would be appropriate.
Also note that there isn't much of a real-world issue: ARP in IPv4 also
works, while it suffers from the same broadcast/multicast problems as
IPv6 neighbor discovery.

More to the point, two very important issues are missing.
                                                                                       
The first is that we are living in 2004. If this were 2001, we could
simply identify the best approach and standardize it. However, IPv6 is
already widely implemented in hosts and deployment is growing. The lack
of a recursive resolver configuration mechanism is felt every day. If
we select an approach that needs considerable implementation effort, it
can be as much as two years before this approach is actually available
to users. The worst choice in this regard would be the RA approach.
While in itself this is a very good approach, it suffers from the fact
that both routers and hosts must support it before it can be used.
Implementation cycles vary widely throughout the industry, but it's
safe to say that anyone who doesn't use both routers AND hosts with the
shortest implementation cycle will have to wait at least until 2006
before an RA approach could conceivably be available.
                                                                                       
The DHCP approach has the advantage that it can be implemented on
special purpose servers rather than having to be implemented in
routers. Some systems use a very simple mechanism to configure
recursive resolver addresses, and on those systems it's very easy to
add a userland DHCP client daemon that handles this task. However, on
widely used systems such as Windows and MacOS X reconfiguring recursive
resolvers isn't something that can be easily done by a userland
program. Realistically, users will have to wait until Microsoft or
Apple bundle support for DHCPv6 in their products. Again, this is
likely to take a significant amount of time.

The well-known address approach on the other hand, can be deployed
pretty much immediately. The only thing that's needed is for IANA to
register a set of addresses and within weeks these addresses would be
usable by any IPv6 implementation that supports DNS queries over IPv6
transport.
                                                                                       
The second issue is security.
                                                                                       
One thing that bothers me about a DHCP-only approach is that it
requires networks that have otherwise no interest in DHCPv6 to run
DHCPv6 servers and clients. Past experience shows that complex
UDP-based protocols are often implemented insecurely. So an approach
that doesn't require additional protocols would be preferable from a
security standpoint. (And from management and debugging standpoints as
well.)
                                                                                       
Both DHCPv6 and RA have an inherent security problem because the host
is supposed to trust information that comes in from unknown sources.
This makes it very easy for an on-link attacker to present itself as a
legitimate DHCP server or router and provide clandestine configuration
information. I believe efforts are underway to remedy this situation,
but again, it will be some time before most clients will be able to use
these new mechanisms in practice. In the mean time having recursive
resolver information be available over insecure DHCP or RA means that
attackers gain an additional attack vector. (And heavy crypto doesn't
exactly go hand in hand with autoconfiguration, it remains to be seen
how well this is going to work in practice for nomadic users.)

Last but not least, not about the draft but about the decision that
needs to be made: it worries me that this issue hasn't been resolved
earlier. I believe one of the main reasons for this is that the DHCP
proponents are blocking consensus on the other approaches in order to
arrive at the situation where everyone implements DHCP and the issue
becomes moot. Note that there are several IPR claims on parts of DHCP
that may or may not apply here, adding insult to injury for those who
don't want to run DHCP in the first place.
                                                                                       
The only way to overcome this abuse of the IETF process is for the IESG
to recognize the lack of consensus and decide on the issue itself.
                                                                                       
Iljitsch van Beijnum
2004-10-13
06 David Kessens [Ballot Position Update] New position, Yes, has been recorded for David Kessens
2004-10-13
06 David Kessens Ballot has been issued by David Kessens
2004-10-13
06 David Kessens Created "Approve" ballot
2004-10-13
06 (System) Ballot writeup text was added
2004-10-13
06 (System) Last call text was added
2004-10-13
06 (System) Ballot approval text was added
2004-10-13
06 David Kessens State Changes to IESG Evaluation from Publication Requested by David Kessens
2004-10-13
06 David Kessens Draft Added by David Kessens in state Publication Requested
2004-09-29
04 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-04.txt
2004-09-09
03 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-03.txt
2004-07-19
02 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-02.txt
2004-06-14
01 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-01.txt
2004-06-02
00 (System) New version available: draft-ietf-dnsop-ipv6-dns-configuration-00.txt